Search Results - (( using personal method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- method algorithm »
- function method »
- using function »
-
1
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Total of ten control methods determined from population and individual data were tested against another 10 healthy persons to evaluate the algorithm performance. …”
Get full text
Get full text
Thesis -
2
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Back in the days, before computers and IT were widely used, history matching was done manually by trial and error method, where personal judgment were very critical in undergoing such methodology. …”
Get full text
Get full text
Final Year Project -
3
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
Get full text
Get full text
Student Project -
4
-
5
Analysis Of Personal Protective Equipment Classification Method Using Deep Learning
Published 2022Get full text
Get full text
Undergraduates Project Papers -
6
Application of decision support system using composite performance index algorithm
Published 2021Get full text
Get full text
Conference or Workshop Item -
7
Estimating the total Malaysian road accidents and fatalities using Gauss-Newton method of least squares / Maureen Giman, Siti Zulaikha Muhamad Zuraidi and Syahida Asyikin Moner
Published 2022“…The iterative process of Broyden's approach is nearly identical to Newton's method. Meanwhile, the Levenberg-Marquadt method uses the gradient descent algorithm, which also has a similar algorithm to the Gauss-Newton method in finding the value for the unknown parameter.…”
Get full text
Get full text
Student Project -
8
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…The modified πRKM is able to perform better partition by identifying the overlapping objects between the correct clusters and also capable to do a re-partition using the indiscernibility relation function. Thirdly, the local and global similarity algorithm is proposed to classify the current user pages request to produce recommendations. …”
Get full text
Get full text
Get full text
Thesis -
9
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
10
Face emotion recognition using artificial intelligence techniques
Published 2008Get full text
Thesis -
11
A Non‑cooperative Uplink Power Control for CDMA Wireless Communication System
Published 2020“…Therefore, enhanced Nash algorithm (ENA) is proposed which only applicable in frst iteration of power control method. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
Get full text
Get full text
Get full text
Article -
15
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
Get full text
Get full text
Get full text
Article -
16
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
17
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
18
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
19
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
20
Human odour detection approach using machine learning
Published 2019“…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis
